-
1
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01Get full text
Article -
2
Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges
Published 2024-01-01“…In recent years, ransomware has also started to target critical infrastructure and Cyber-Physical Systems (CPS) such as industrial control systems, smart grids, and healthcare networks. The unique attack surface and safety-critical nature of CPS introduce new challenges in defending against ransomware. …”
Get full text
Article -
3
MHSDN: A Hierarchical Software Defined Network Reliability Framework design
Published 2023-01-01“…Simultaneously, the attack surface measurement of MD is innovatively proposed, further improving the security and usability measurement standards of the MD system. …”
Get full text
Article -
4
A Secure Object Detection Technique for Intelligent Transportation Systems
Published 2024-01-01“…However, due to the distributed nature of federated learning, there is a larger attack surface, making cyber-attack detection and defense challenging. …”
Get full text
Article -
5
Evaluation of Mechanical and Durability Properties of Eco-Friendly Concrete Containing Silica Fume, Waste Glass Powder, and Ground Granulated Blast Furnace Slag
Published 2022-01-01“…The properties evaluated in this study include compressive, tensile, and flexural strength, magnesium sulfate and sulfuric acid attack, surface resistivity, rapid chloride penetrability test (RCPT), water absorption, depth of penetration of water, and microstructure analysis by scanning electron microscopy (SEM). …”
Get full text
Article -
6
Quantum Key Distribution Applicability to Smart Grid Cybersecurity Systems
Published 2025-01-01“…Unfortunately, the increased information flow will increase the potential attack surface and introduce new vulnerabilities. While a smarter grid will depend critically on information flow, these benefits will be accrued only if that information can be protected. …”
Get full text
Article -
7
An MLLM-Assisted Web Crawler Approach for Web Application Fuzzing
Published 2025-01-01“…Web application fuzzing faces significant challenges in achieving comprehensive test interface (attack surface) coverage, primarily due to the complexity of user interactions and dynamic website architectures. …”
Get full text
Article -
8
Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats
Published 2024-12-01“…By taking a comprehensive approach to network security, the study evaluates how well Zero Trust Architecture mitigates security risks and shrinks the attack surface. It looks into the difficulties and factors to be taken into account when adopting Zero Trust Architecture, including scalability, user experience, and operational complexity. …”
Get full text
Article -
9
Hybrid dung beetle optimization based dimensionality reduction with deep learning based cybersecurity solution on IoT environment
Published 2025-01-01“…Cybersecurity analysts often refer to this as increasing the attack surface from which hackers can benefit. Implementing the proper security measures is crucial since IoT devices can be vulnerable to cyberattacks and are often built with limited security features. …”
Get full text
Article -
10
Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix
Published 2023-01-01“…However, the deployment of these technologies increases the overall attack surface. The MITRE ATT&CK® matrices have been developed to document an adversary’s tactics and techniques based on real-world observations. …”
Get full text
Article -
11
Enfouissement du témoignage et archivage oraculaire dans Oracle Night de Paul Auster
Published 2017-12-01“…This article explores the inscription of historical testimony within fictional frames, by way of collage, fragmentation, ellipsis, chronological reshuffling and polyphonia, whose upshot is the broadening of the writer’s scope after 1945. Here the 9/11 attacks surface fleetingly, by way of a belated negative.…”
Get full text
Article -
12
Safety of Systems Integrating Fire Protection Equipment – Risks, Gaps, Recommendations
Published 2024-12-01“…Project and methods: A detailed review of the literature and cybersecurity standards applicable to fire protection systems, such as NFPA 72, was conducted, from which key points that are vulnerable elements and represent attack surfaces were identified. The Cybersecurity for Fire Protection Systems report from a workshop held by the Research Foundation in 2021 was analysed. …”
Get full text
Article